Symphony Current Overview
Version: v1.0 (Draft) Status: Draft Authoritative: Yes
Purpose
This document is the starting point for the current Symphony documentation set.
At the highest level, Symphony should be understood as a decentralized privacy data platform. It is designed for large-scale private data ingestion, storage, governance, protected query, business activities such as precision marketing, protected computation, and model training.
It answers:
- what Symphony is at the platform level
- what
SCPandSCSare within that platform - why they are documented separately
- what each line covers after the latest protocol revision
- how readers should move through the canonical set
Platform Positioning
Symphony is not only a protocol set or a system architecture description. It is the umbrella platform for privacy-preserving data collaboration and data-driven work across decentralized boundaries.
From that platform perspective, Symphony is designed to let customers:
- upload and govern large volumes of private data
- keep raw records inside controlled Vault or TEE boundaries
- run protected query and analysis against governed semantics
- support business activities such as precision marketing without exposing raw user data
- execute protected computation and model training with replayable and auditable evidence
SCP and SCS are therefore best read as the two canonical documentation lines that explain how the platform stays trustworthy and implementable.
Two Canonical Lines
SCP: Symphony Core Protocol
SCP is the protocol specification.
It defines:
- what the protocol governs
- lifecycle and state semantics
- actor duties and economics constraints
- semantic namespace, domain, and attribute evolution
- epoch-window, settlement, reward, and governance meaning
SCP does not define a particular deployment, database, service split, or worker topology.
SCS: Symphony Core System
SCS is the system realization specification.
It defines:
- how runtime modules realize the SCP layers
- how persistence and integration domains preserve protocol semantics
- how semantic, epoch, settlement, reward, and payout artifacts are carried through implementation
- how delivery, deployment, migration, and operations preserve protocol truth in production
SCS does not redefine protocol truth. It explains how a system implements and preserves it.
Scope
Together, SCP and SCS cover:
- deterministic task admission, execution, verification, and settlement
- private data protection inside Vault and authorized TEE boundaries
- protected query, audience selection, and business activities such as precision marketing
- privacy-preserving feature construction and model training
- semantic namespace evolution under governed compatibility
- epoch-windowed accounting, aggregation, and replay partitioning
- reward accounting and downstream payout realization
- replay, audit, and governance-safe operations
Non-Goals
This canonical set does not try to:
- collapse protocol semantics and implementation details into one document
- define an unbounded generic compute marketplace
- treat downstream chain state as the source of protocol truth
- assume one mandatory runtime topology for every deployment